Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Student Research Guide: Winter 2022 - Securing data in a post-quantum era: Top 10 Resources

By Joshua Spagnole

Top 10 Resources

Desrosiers, S. P. (2009). Entropic security in quantum cryptography. Quantum Information Processing, 8(4), 331–345. https://doi.org/10.1007/s11128-009-0111-3

This article goes over common definitions used for quantum encryption. I chose this article because finding definitions for terminology in quantum cryptography is important for understanding it.

Dyakonov, M. I. (2020). Will We Ever Have a Quantum Computer? SpringerBriefs in Physics. https://doi.org/10.1007/978-3-030-42019-2

This article goes over the basics of quantum mechanics and talks about it in a more skeptical light. It provides a more skeptical perspective when it comes to quantum supremacy and quantum computing in general. It also goes over the basics of quantum computing because it’s more intended for a general audience.

Hughes, D. H. (2007). Cyberspace Security via Quantum Encryption. Military Technology, 31(5), 84–87.

This article goes over how electronic signals can be turned into fiber optic signals and encrypted through a quantum channel. It relates to one of the concerns of classical computers becoming obsolete in terms of cybersecurity. This article addresses that and also has some diagrams to help explain what is being described.

Hwang, T., Luo, Y.-P., Yang, C.-W., & Lin, T.-H. (2014). Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants.   Quantum Information Processing, 13(4), 925–933. https://doi.org/10.1007/s11128-013-0702-x

This article covers quantum authencryption which is a relatively new idea in the field of quantum cryptography. I wanted to address some concerns that businesses and governments might have when switching encrypting methods once quantum computers become mainstream which this article does pretty well.

Iqbal, H., Krawec, W.O. (2020) Semi-quantum cryptography. Quantum Inf Process 19, 97. https://doi.org/10.1007/s11128-020-2595-9

This article goes over the idea of using quantum computers to encrypt classical information and quantum key distribution, security, and communication between quantum and semi-quantum or classical computers. It also includes some useful basic information on quantum cryptography.

           Kalai, G. (2016). The Quantum Computer Puzzle. Notices of the American Mathematical Society, 63(05), 508–516. https://doi.org/10.1090/noti1380

This is another article I found discussing the viability of quantum computers and some major problems that have been encountered while trying to develop them. It treats quantum computing as more of a theoretical idea rather than an eventual reality. It goes over the pessimistic hypothesis which is essentially treating quantum computers as something that isn’t realistically feasible without lots of error.

Korchenko, O., Vasiliu, Y., & Gnatyuk, S. (2010). Modern Quantum Technologies of Information Security against Cyber-Terrorist Attacks. Aviation (1648-7788), 14(2), 58–69. https://doi.org/10.3846/aviation.2010.10

This article takes a more political approach to the field of quantum cryptography and also includes explanations of quantum key distribution and other key ideas.

Qi, B., Lougovski P., Pooser R., Grice W., Bobrek M. (2015, October 21). Generating the local oscillator “Locally'' in continuous-variable quantum key distribution based on coherent detection. Physical Review X, 5(4), 1-11. https://doi.org/10.1103/PhysRevX.5.041009

This article goes over a form of quantum key distribution and explains how it works mathematically. This article is useful because it explains quantum encryption using optical physics.

Takagi, Wakayama, M., Tanaka, K., Kunihiro, N., Kimoto, K., & Ikematsu, Y. (2021). International Symposium on Mathematics, Quantum Theory, and Cryptography Proceedings of MQC 2019 (1st ed. 2021.). Springer Singapore. https://doi.org/10.1007/978-981-15-5191-8

This is a book that goes over the terminology and recent advancements in quantum cryptography. I chose this article because I thought it would be a good resource to come back to when there’s an idea in a different that you don’t quite understand.

Tibbetts, J. (2019, September). Quantum Computing and Cryptography: Analysis, Risks, and Recommendations for Decisionmakers. Lawrence Livermore National Library. Retrieved February 16, 2022, from https://cgsr.llnl.gov/content/assets/docs/QuantumComputingandCryptography-20190920.pdf

           This article goes over and addresses concerns in relation to quantum computers and various government responses to these issues. This article covers core ideas in computer science like the idea of complexity classes for computational problems. Complexity classes are important for explaining how quantum computers bypass encryption methods in use today.

All Content CC-BY.